ALT-BU-2022-7497-1
Branch sisyphus update bulletin.
Package xorg-server updated to version 21.1.6-alt1 for branch sisyphus in task 311984.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-3550
A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=11beef0b7f1ed290348e45618e5fa0d2bffcb72e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=11beef0b7f1ed290348e45618e5fa0d2bffcb72e
- [debian-lts-announce] 20221110 [SECURITY] [DLA 3185-1] xorg-server security update
- [debian-lts-announce] 20221110 [SECURITY] [DLA 3185-1] xorg-server security update
- FEDORA-2022-9100b7aafd
- FEDORA-2022-9100b7aafd
- FEDORA-2022-5495b36bed
- FEDORA-2022-5495b36bed
- FEDORA-2022-64ad80875c
- FEDORA-2022-64ad80875c
- FEDORA-2022-613e993500
- FEDORA-2022-613e993500
- GLSA-202305-30
- GLSA-202305-30
- https://vuldb.com/?id.211051
- https://vuldb.com/?id.211051
- DSA-5278
- DSA-5278
Modified: 2024-11-21
CVE-2022-3551
A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=18f91b950e22c2a342a4fbc55e9ddf7534a707d2
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=18f91b950e22c2a342a4fbc55e9ddf7534a707d2
- [debian-lts-announce] 20221110 [SECURITY] [DLA 3185-1] xorg-server security update
- [debian-lts-announce] 20221110 [SECURITY] [DLA 3185-1] xorg-server security update
- FEDORA-2022-9100b7aafd
- FEDORA-2022-9100b7aafd
- FEDORA-2022-5495b36bed
- FEDORA-2022-5495b36bed
- FEDORA-2022-64ad80875c
- FEDORA-2022-64ad80875c
- FEDORA-2022-613e993500
- FEDORA-2022-613e993500
- GLSA-202305-30
- GLSA-202305-30
- https://vuldb.com/?id.211052
- https://vuldb.com/?id.211052
- DSA-5278
- DSA-5278
Package python3-module-nbconvert updated to version 7.2.6-alt1 for branch sisyphus in task 311157.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-32862
The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).
- https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
- https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
- https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm
- https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3442-1] nbconvert security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3442-1] nbconvert security update
- https://lists.debian.org/debian-lts-announce/2024/09/msg00004.html
Package simple-scan updated to version 42.5-alt2 for branch sisyphus in task 312016.
Closed bugs
packagekit is needed by simple-scan
Package kernel-image-std-def updated to version 5.15.84-alt1 for branch sisyphus in task 312006.
Closed vulnerabilities
BDU:2023-00359
Уязвимость драйвера drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-3545
A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
- https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
- [debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update
- [debian-lts-announce] 20230302 [SECURITY] [DLA 3349-1] linux-5.10 security update
- [debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update
- [debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update
- https://security.netapp.com/advisory/ntap-20221223-0003/
- https://security.netapp.com/advisory/ntap-20221223-0003/
- https://vuldb.com/?id.211045
- https://vuldb.com/?id.211045
- DSA-5324
- DSA-5324